Previous versions of NTP do not properly check the return value from the
OpenSSL EVP_VerifyFinal funciton, which allows remote attackers to bypass
validation of the certificate chain via a malformed SSL/TLS signature for
DSA and ECDSA keys.